Re: HTTP based trojansFrom: s.wun (email@example.com)
- Previous message: Kavitha Srinivasan: "Re: Prelude IDS"
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ] [ attachment ]
From: "s.wun" <firstname.lastname@example.org> To: <AQBARROS@BKB.com.br>, <email@example.com> Date: Wed, 6 Nov 2002 11:26:34 +0800
What other open-source tool do you use to detect this attack?
> As I saw on the last messages about detecting trojans through flow-based
> analysis, I thought if someone already made anything to detect trojans
> use Internet Explorer controls to communicate with the client, even on
> networks that allow only proxied (even authenticated) http connections.
> anyone try to do such kind of thing?